Communication Theory of Secrecy Systems*
From MaRDI portal
Publication:3645296
Recommendations
Cited in
(only showing first 100 items - show all)- Fault tolerant authenticated quantum dialogue based on logical qubits and controlled-not operations
- A secure image encryption algorithm based on Rubik's cube principle
- Resource requirements of private quantum channels and consequences for oblivious remote state preparation
- Hash functions from defective ideal ciphers
- FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES
- A novel method to identify initial values of chaotic maps in cybersecurity
- Prospects of quantum-classical optimization for digital design
- Authenticated key agreement in dynamic peer groups
- Obituary: Claude Elwood Shannon 1916-2001
- Analysis and improvement of a hash-based image encryption algorithm
- Shannon impossibility, revisited
- Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement
- Nonlinearities of S-boxes
- Image encryption using finite-precision error
- Some methods for constructing MDS-matrices over finite field
- Ising game: nonequilibrium steady states of resource-allocation systems
- Image encryption using DNA addition combining with chaotic maps
- A privacy scheme for digital images based on quantum particles
- A generalization of Hellman's extension of Shannon's approach to cryptography
- Properties of two Shannon's ciphers
- Multi-party quantum secret sharing with the single-particle quantum state to encode the information
- Xor-implications and E-implications: classes of fuzzy implications based on fuzzy Xor
- Latin squares over Abelian groups
- A novel digital contents privacy scheme based on Kramer's arbitrary spin
- Application based construction and optimization of substitution boxes over 2D mixed chaotic maps
- Building blockcipher from small-block tweakable blockcipher
- Confidentiality and differential privacy in the dissemination of frequency tables
- On the power of cascade ciphers
- A new fractional one dimensional chaotic map and its application in high-speed image encryption
- Statistical test criteria for sensitivity indexes of image cryptosystems
- Loss-tolerant measurement-device-independent quantum random number generation
- Stimulated emission of radiation and the black hole information problem
- Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Error correcting codes, block designs, perfect secrecy and finite fields
- Group ring based public key cryptosystems
- The Latin squares and the secret sharing schemes
- scientific article; zbMATH DE number 7559047 (Why is no real title available?)
- Towards a general construction of recursive MDS diffusion layers
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Differentially 4-uniform bijections by permuting the inverse function
- Nachrichten�bertragung und Nachrichtenverarbeitung (Neue gedankliche Werkzeuge)
- Entropy dimension reduction method for randomized machine learning problems
- Lightweight MDS generalized circulant matrices
- Dispelling myths on superposition attacks: formal security model and attack analyses
- Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
- Cellular automata based S-boxes
- scientific article; zbMATH DE number 4070800 (Why is no real title available?)
- Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratio
- New field of cryptography: DNA cryptography
- Algebraic Cryptanalysis of the Data Encryption Standard
- scientific article; zbMATH DE number 3409421 (Why is no real title available?)
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- A new synchronisation method of fractional-order chaotic systems with distinct orders and dimensions and its application in secure communication
- Construction of one-way hash functions with increased key space using adaptive chaotic maps
- Constructions of \(q\)-ary functions with good global avalanche characteristics
- Controlled quantum dialogue with five-qubit entangled states
- A novel hybrid secure confidentiality mechanism for medical environment based on Kramer's spin principle
- An efficient quantum private comparison of equality over collective-noise channels
- Semiquantum key distribution using initial states in only one basis without the classical user measuring
- Improved quantum `ping-pong protocol based on five-qubit GHZ state and classical CNOT operation
- Unconditionally secure short key ciphers based on data compression and randomization
- Improvement of information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom
- STEPS TOWARDS CRYPTANALYSIS OF CHAOTIC ACTIVE/PASSIVE DECOMPOSITION ENCRYPTION SCHEMES USING AVERAGE DYNAMICS ESTIMATION
- COMPLEXITY, INFORMATION, ENERGY
- The physical foundation of quantum theory
- Exploiting randomness on continuous sets
- Symmetry of information and one-way functions
- Unconditionally secure quantum signatures
- Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation
- The design of the ICE encryption algorithm
- A quantum dialogue reduced by half unitary operations
- A chaos-based approach to the design of cryptographically secure substitutions
- Heuristic algorithm for obtaining permutations with given cryptographic properties using a generalized construction
- Codes for a generalized wire-tap channel model
- Fundamental problems in provable security and cryptography
- Secure image encryption algorithm design using a novel chaos based S-Box
- Image security system using recursive cellular automata substitution
- Algorithms for checking some properties of \(n\)-quasigroups
- Circulant matrices over \(\mathbb{F}_2\) and their use for the construction of efficient linear transformations with high branch numbers
- Methods of linear and differential relations in cryptography
- Survey on hardware implementation of random number generators on FPGA: theory and experimental analyses
- scientific article; zbMATH DE number 2102395 (Why is no real title available?)
- Quantum privacy and quantum wiretap channels
- Simulation of QTRNG on IBM's Q experience using rotation and phase quantum gates
- A chaotic block cipher algorithm for image cryptosystems
- Simultaneous secrecy and reliability amplification for a general channel model
- A new spatiotemporally chaotic cryptosystem and its security and performance analyses
- On construction of perfect ciphers
- Algebraic nonlinearity and its applications to cryptography
- Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count
- An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach
- A construction of a cipher from a single pseudorandom permutation.
- Cryptanalysis of a DNA-based image encryption scheme
- The communication complexity of private simultaneous messages, revisited
- A novel algorithm for image encryption based on mixture of chaotic maps
- Lifting standard model reductions to common setup assumptions
- Physical layer security over Tsallis statistics for wireless communications with hardware impairments in the presence of some eavesdroppers
- The whirlpool secure hash function
- Quantum correlation with entanglement and mutual entropy
This page was built for publication: Communication Theory of Secrecy Systems*
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3645296)